Analysis

  • max time kernel
    147s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20230703-en
  • resource tags

    arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system
  • submitted
    08/07/2023, 16:22

General

  • Target

    7e9c08b8b33bb3exeexeexeex.exe

  • Size

    48KB

  • MD5

    7e9c08b8b33bb3cc65d01ba1d78388ad

  • SHA1

    6c56d9b3498050faf570a17d2d7d03b35ee13e46

  • SHA256

    cbd46c01d71b33690192707656f974745d4877ff6b9efb7f7cb118feb1da9397

  • SHA512

    97e2425bf8cbdee44cbd4b321c4e9779c6e043cb7c5d9042eccf215719eed762d084b5f8a8e9f34a962695f031b8ddcca5772309f4df0e9c7edb29b3c7b5d21b

  • SSDEEP

    768:bIDOw9UiaCHfjnE0Sfa7ilR0p9u6p4Uu6EIEIDKlEuP:bIDOw9a0DwitDwIzDKlEuP

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7e9c08b8b33bb3exeexeexeex.exe
    "C:\Users\Admin\AppData\Local\Temp\7e9c08b8b33bb3exeexeexeex.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2336
    • C:\Users\Admin\AppData\Local\Temp\lossy.exe
      "C:\Users\Admin\AppData\Local\Temp\lossy.exe"
      2⤵
      • Executes dropped EXE
      PID:2940

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lossy.exe

    Filesize

    48KB

    MD5

    5cd5d4d9f9e6429b53e6945dce141689

    SHA1

    b373bc47c7edc2a707f2670ba3301e9a814e5ef6

    SHA256

    df62e555213ee052a8bf9dd31fa66776138ab009cfb2826518085fedbcbd9656

    SHA512

    d48f6d6896b59f1748d3e0b7daafb38596cd37ff4d086f1d9c3ffd0fb57a455eb0669362c540c9a7f5b7dfdb82ca768106e5c0cf2b33d00ceb7064627c24660f

  • C:\Users\Admin\AppData\Local\Temp\lossy.exe

    Filesize

    48KB

    MD5

    5cd5d4d9f9e6429b53e6945dce141689

    SHA1

    b373bc47c7edc2a707f2670ba3301e9a814e5ef6

    SHA256

    df62e555213ee052a8bf9dd31fa66776138ab009cfb2826518085fedbcbd9656

    SHA512

    d48f6d6896b59f1748d3e0b7daafb38596cd37ff4d086f1d9c3ffd0fb57a455eb0669362c540c9a7f5b7dfdb82ca768106e5c0cf2b33d00ceb7064627c24660f

  • \Users\Admin\AppData\Local\Temp\lossy.exe

    Filesize

    48KB

    MD5

    5cd5d4d9f9e6429b53e6945dce141689

    SHA1

    b373bc47c7edc2a707f2670ba3301e9a814e5ef6

    SHA256

    df62e555213ee052a8bf9dd31fa66776138ab009cfb2826518085fedbcbd9656

    SHA512

    d48f6d6896b59f1748d3e0b7daafb38596cd37ff4d086f1d9c3ffd0fb57a455eb0669362c540c9a7f5b7dfdb82ca768106e5c0cf2b33d00ceb7064627c24660f

  • memory/2336-54-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2336-55-0x0000000000270000-0x0000000000276000-memory.dmp

    Filesize

    24KB

  • memory/2940-68-0x0000000000470000-0x0000000000476000-memory.dmp

    Filesize

    24KB